Article 66J7W Want to detect Cobalt Strike on the network? Look to process memory

Want to detect Cobalt Strike on the network? Look to process memory

by
from www.theregister.com - Articles on (#66J7W)
Story ImageSecurity analysts have tools to spot hard-to-find threat, Unit 42 says

Enterprise security pros can detect malware samples in environments that incorporate the highly evasive Cobalt Strike attack code by analyzing artifacts in process memory, according to researchers with Palo Alto Networks' Unit 42 threat intelligence unit....

External Content
Source RSS or Atom Feed
Feed Location http://www.theregister.co.uk/headlines.atom
Feed Title www.theregister.com - Articles
Feed Link https://www.theregister.com/
Reply 0 comments